PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Bi-objective maritime route planning in pirate-infested waters

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Contemporary maritime shipping is subject to a large number of constraints given by tight shipping schedules and very low margins. Additionally, problematic areas with increased security needs dynamically changing in time, combined with seasonal oceanographic and meteorological conditions pose a challenging voyage planning problem. In this work we present a risk-aware voyage planner taking into account spatio-temporal environmental conditions. The planner is based on a graph-based search algorithm A* . We discretize the required area into a graph, we store various layers of information into the edges of the graph (such as risk and weather conditions) in a form of numeric weights and we define a bi-objective planning problem with a tradeoff between security and duration of the voyage. The nature of the algorithm guarantees a complete and optimal solution in a form of an optimized voyage with respect to the criterion function composed of the two weighted components, i.e, duration and security of the voyage. We demonstrate the approach on our area of interest: Indian Ocean. We use NATO piracy activity risk surface as the risk layer and we compute all transit voyages between relevant routing points in the area. Finally, thanks to the discretization of the problem, we are able to integrate corridors imposed by the shipping authorities and evaluate additional what-if scenarios with extended corridor systems. The resulting planner is exposed to the public using a web service with an easy interface requiring start time of the voyage and the origin and the destination point of voyage. Combined with an expressive visualization, this tool demonstrates the capabilities of the proposed solution.
Rocznik
Strony
115--124
Opis fizyczny
Bibliogr. 19 poz., rys.
Twórcy
autor
  • Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
autor
  • Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
autor
  • Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
autor
  • Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
  • Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Science 2 Technicka St., Praha 6, Czech Republic
Bibliografia
  • 1. BARTON, D.C. & STAMBER, K.L. (2000) An agent-based microsimulation of critical infrastructure systems. Technical report. Sandia National Labs., Albuquerque, NM (US); Sandia National Labs., Livermore, CA (US).
  • 2. BOURDON, S., GAUTHIER, Y. & GREISS, J. (2007) MATRICS: A maritime traffic simulation. Technical report. Defence R&D Canada.
  • 3. BRUZZONE, A.G., MASSEI, M., MADEO, F., TARONE, F. & GUNAL M.M. (2011) Simulating marine asymmetric scenarios for testing different C2 maturity levels. In: Proceedings of the 16th International Command and Control Researh and Technology Symposium. pp. 12–23.
  • 4. CHAWDHRY, P.K. (2009) Risk modeling and simulation of airport passenger departures process. In: Proceedings of the 2009 Winter Simulation Conference. Austin, TX, 13–16 Dec. 2009. IEEE. pp. 2820–2831.
  • 5. DECRAENE, J., ANDERSON, M. & LOW, M.Y.H. (2010) Maritime counter-piracy study using agent-based simulations. In: Proceedings of the 2010 Spring Simulation Multiconference. New York: ACM. pp. 82–89.
  • 6. HANSEN, J., JACOBS, G., HSU, L., DYKES, J., DASTUGUE, J., ALLARD, R., BARRON, C., LALEJINI, D., ABRAMSON, M., RUSSELL, S. & MITTU, R. (2011) Information domination: Dynamically coupling METOC and INTEL for improved guidance for piracy interdiction. NRL Review. pp. 110–115.
  • 7. HASEGAWA, K., HATA, K., SHIOJI, M., NIWA, K., MORI, S. & FUKUDA, H. (2004) Maritime traffic simulation in congested waterways and its applications. In: 4 th Conference for New Ship and Marine Technology. Chine, pp. 195–199.
  • 8. HWANG, CH.-L. & MASUD, A.S. (1979) Multiple objective decision making: methods and applications. Berlin: Springer-Verlag.
  • 9. KOCH, D.B. (2007) PortSim – a port security simulation and visualization tool. In: Proceedings of 41st Annual IEEE International Carnahan Conference on Security Technology. IEEE. pp. 109–116.
  • 10. LAUREN, M. & STEPHEN, R. (2002) Map-aware nonuniform automata (MANA)-a New Zealand approach to scenario modelling. Journal of Battlefield Technology. 5. pp. 27–31.
  • 11. MCGUIRE. G. (2009) Combined Maritime Forces (CMF) – who we are and wider military counter piracy update. Brief presented at the MARLO Maritime Conference, Dubai, UAE. December 2009. Availabe from: http://www.cusnc.navy.mil/marlo/Events/DEC09- MARLO-DubaiConference.htm
  • 12. ONUOHA, F.C. (2010) Piracy and maritime security off the Horn of Africa: Connections, causes, and concerns. African Security. 3(4). pp. 191–215.
  • 13. RUSSELL, S.J., NORVIG, P., DAVIS, E., RUSSELL, S.J. & RUSSELL, S.J. (2010) Artificial intelligence: a modern approach. New Jork: Prentice Hall.
  • 14. SEBBAH, S., GHANMI, A. & BOUKHTOUTA, A. (2011) Modeling and simulation of military tactical logistics distribution. In: Proceedings of the 2011 Winter Simulation Conference. Phoenix, AZ, 11–14 Dec. 2011. IEEE. pp. 2507–2518.
  • 15. SLOOTMAKER, L.A. (2011) Countering piracy with the nextgeneration piracy performance surface model (master thesis). Technical report, Naval Postgraduate School. Monterey California.
  • 16. TSILIS, T. (2011) Counter-piracy escort operations in the Gulf of Aden (master thesis). Technical report, Naval Postgraduate School, Monterey California.
  • 17. United Kingdom. ICC International Maritime Bureau (2000) Piracy and armed robbery against ships. Technical report. London: Cinnabar Wharf, 24 Wapping High Street.
  • 18. VANĚK, O., JAKOB, M., HRSTKA, O. & PĚCHOUČEK, M. (2013) Agent-based model of maritime traffic in piracyaffected waters. Transportation research part C: emerging technologies. 36. pp. 157–176.
  • 19. WONG, M.CH. & YIP, T.L. (2012) Maritime piracy: an analysis of attacks and violence. International Journal of Shipping and Transport Logistics. 4(4). pp. 306–322.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a7ec244e-39fd-4e02-99a4-2392f604757c
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.